Information Assurance, Security and Privacy Services

Information Assurance, Security and Privacy Services

Author: H. Raghav Rao

Publisher: Emerald Group Publishing

ISBN: 9781848551947

Category: Computers

Page: 726

View: 859

Focuses on Information Assurance, Security and Privacy Services. This book discusses Program Security, Data Security and Authentication, Internet Scourges, Web Security, Usable Security, Human-Centric Aspects, Security, Privacy and Access Control, Economic Aspects of Security, Threat Modeling, Intrusion and Response.

Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics

Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics

Author: Khosrow-Pour, D.B.A., Mehdi

Publisher: IGI Global

ISBN: 9781522574934

Category: Computers

Page: 417

View: 275

Cyber-attacks are rapidly becoming one of the most prevalent issues globally, and as they continue to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Beyond cyber-attacks, personal information is now routinely and exclusively housed in cloud-based systems. The rising use of information technologies requires stronger information security and system procedures to reduce the risk of information breaches. Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics presents emerging research and methods on preventing information breaches and further securing system networks. While highlighting the rising concerns in information privacy and system security, this book explores the cutting-edge methods combatting digital risks and cyber threats. This book is an important resource for information technology professionals, cybercrime researchers, network analysts, government agencies, business professionals, academicians, and practitioners seeking the most up-to-date information and methodologies on cybercrime, digital terrorism, network security, and information technology ethics.

Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications

Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications

Author: Rawat, Danda B.

Publisher: IGI Global

ISBN: 9781466646926

Category: Computers

Page: 577

View: 352

"This book examines the current scope of theoretical and practical applications on the security of mobile and wireless communications, covering fundamental concepts of current issues, challenges, and solutions in wireless and mobile networks"--Provided by publisher.

Strategic System Assurance and Business Analytics

Strategic System Assurance and Business Analytics

Author: P. K. Kapur

Publisher: Springer Nature

ISBN: 9789811536472

Category: Business & Economics

Page: 602

View: 243

This book systematically examines and quantifies industrial problems by assessing the complexity and safety of large systems. It includes chapters on system performance management, software reliability assessment, testing, quality management, analysis using soft computing techniques, management analytics, and business analytics, with a clear focus on exploring real-world business issues. Through contributions from researchers working in the area of performance, management, and business analytics, it explores the development of new methods and approaches to improve business by gaining knowledge from bulk data. With system performance analytics, companies are now able to drive performance and provide actionable insights for each level and for every role using key indicators, generate mobile-enabled scorecards, time series-based analysis using charts, and dashboards. In the current dynamic environment, a viable tool known as multi-criteria decision analysis (MCDA) is increasingly being adopted to deal with complex business decisions. MCDA is an important decision support tool for analyzing goals and providing optimal solutions and alternatives. It comprises several distinct techniques, which are implemented by specialized decision-making packages. This book addresses a number of important MCDA methods, such as DEMATEL, TOPSIS, AHP, MAUT, and Intuitionistic Fuzzy MCDM, which make it possible to derive maximum utility in the area of analytics. As such, it is a valuable resource for researchers and academicians, as well as practitioners and business experts.

Responsible AI and Analytics for an Ethical and Inclusive Digitized Society

Responsible AI and Analytics for an Ethical and Inclusive Digitized Society

Author: Denis Dennehy

Publisher: Springer Nature

ISBN: 9783030854478

Category: Computers

Page: 788

View: 150

This volume constitutes the proceedings of the 20th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2021, held in Galway, Ireland, in September 2021.* The total of 57 full and 8 short papers presented in these volumes were carefully reviewed and selected from 141 submissions. The papers are organized in the following topical sections: AI for Digital Transformation and Public Good; AI & Analytics Decision Making; AI Philosophy, Ethics & Governance; Privacy & Transparency in a Digitized Society; Digital Enabled Sustainable Organizations and Societies; Digital Technologies and Organizational Capabilities; Digitized Supply Chains; Customer Behavior and E-business; Blockchain; Information Systems Development; Social Media & Analytics; and Teaching & Learning. *The conference was held virtually due to the COVID-19 pandemic.

Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing

Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing

Author: Yang, Xiaoyu

Publisher: IGI Global

ISBN: 9781466628557

Category: Computers

Page: 452

View: 898

Innovations in cloud and service-oriented architectures continue to attract attention by offering interesting opportunities for research in scientific communities. Although advancements such as computational power, storage, networking, and infrastructure have aided in making major progress in the implementation and realization of cloud-based systems, there are still significant concerns that need to be taken into account. Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing aims to present insight into Cloud principles, examine associated methods and technologies, and investigate the use of service-oriented computing technologies. In addressing supporting infrastructure of the Cloud, including associated challenges and pressing issues, this reference source aims to present researchers, engineers, and IT professionals with various approaches in Cloud computing.

Architectures and Protocols for Secure Information Technology Infrastructures

Architectures and Protocols for Secure Information Technology Infrastructures

Author: Ruiz-Martinez, Antonio

Publisher: IGI Global

ISBN: 9781466645158

Category: Computers

Page: 427

View: 915

With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for researchers, engineers, and professionals interested in exploring recent advances in ICT security.

Cloud Technology: Concepts, Methodologies, Tools, and Applications

Cloud Technology: Concepts, Methodologies, Tools, and Applications

Author: Management Association, Information Resources

Publisher: IGI Global

ISBN: 9781466665408

Category: Computers

Page: 2300

View: 717

As the Web grows and expands into ever more remote parts of the world, the availability of resources over the Internet increases exponentially. Making use of this widely prevalent tool, organizations and individuals can share and store knowledge like never before. Cloud Technology: Concepts, Methodologies, Tools, and Applications investigates the latest research in the ubiquitous Web, exploring the use of applications and software that make use of the Internet’s anytime, anywhere availability. By bringing together research and ideas from across the globe, this publication will be of use to computer engineers, software developers, and end users in business, education, medicine, and more.

IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications

IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications

Author: Management Association, Information Resources

Publisher: IGI Global

ISBN: 9781466629202

Category: Technology & Engineering

Page: 2036

View: 405

IT policies are set in place to streamline the preparation and development of information communication technologies in a particular setting. IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications is a comprehensive collection of research on the features of modern organizations in order to advance the understanding of IT standards. This is an essential reference source for researchers, scholars, policymakers, and IT managers as well as organizations interested in carrying out research in IT policies.

Standards and Standardization: Concepts, Methodologies, Tools, and Applications

Standards and Standardization: Concepts, Methodologies, Tools, and Applications

Author: Management Association, Information Resources

Publisher: IGI Global

ISBN: 9781466681125

Category: Computers

Page: 1500

View: 552

Effective communication requires a common language, a truth that applies to science and mathematics as much as it does to culture and conversation. Standards and Standardization: Concepts, Methodologies, Tools, and Applications addresses the necessity of a common system of measurement in all technical communications and endeavors, in addition to the need for common rules and guidelines for regulating such enterprises. This multivolume reference will be of practical and theoretical significance to researchers, scientists, engineers, teachers, and students in a wide array of disciplines.

Information Systems and Neuroscience

Information Systems and Neuroscience

Author: Fred D. Davis

Publisher: Springer Nature

ISBN: 9783030281441

Category: Computers

Page: 372

View: 951

This book presents the proceedings of the NeuroIS Retreat 2019, held on June 4–6 in Vienna, Austria, reporting on topics at the intersection of information systems (IS) research, neurophysiology and the brain sciences. Featuring the latest findings from top scholars in the field, it offers detailed insights into the neurobiology underlying IS behavior, essential methods and tools and their applications for IS, as well as applying neuroscience and neurophysiological to advance IS theory.

Encyclopedia of Information Assurance - 4 Volume Set (Print)

Encyclopedia of Information Assurance - 4 Volume Set (Print)

Author: Rebecca Herold

Publisher: CRC Press

ISBN: 9781351235792

Category: Computers

Page: 3860

View: 950

Charged with ensuring the confidentiality, integrity, availability, and delivery of all forms of an entity's information, Information Assurance (IA) professionals require a fundamental understanding of a wide range of specializations, including digital forensics, fraud examination, systems engineering, security risk management, privacy, and compliance. Establishing this understanding and keeping it up to date requires a resource with coverage as diverse as the field it covers. Filling this need, the Encyclopedia of Information Assurance presents an up-to-date collection of peer-reviewed articles and references written by authorities in their fields. From risk management and privacy to auditing and compliance, the encyclopedia’s four volumes provide comprehensive coverage of the key topics related to information assurance. This complete IA resource: Supplies the understanding needed to help prevent the misuse of sensitive information Explains how to maintain the integrity of critical systems Details effective tools, techniques, and methods for protecting personal and corporate data against the latest threats Provides valuable examples, case studies, and discussions on how to address common and emerging IA challenges Placing the wisdom of leading researchers and practitioners at your fingertips, this authoritative reference provides the knowledge and insight needed to avoid common pitfalls and stay one step ahead of evolving threats. Also Available Online This Taylor & Francis encyclopedia is also available through online subscription, offering a variety of extra benefits for researchers, students, and librarians, including:  Citation tracking and alerts  Active reference linking  Saved searches and marked lists  HTML and PDF format options Contact Taylor and Francis for more information or to inquire about subscription options and print/online combination packages. US: (Tel) 1.888.318.2367; (E-mail) [email protected] International: (Tel) +44 (0) 20 7017 6062; (E-mail) [email protected]